Download presentation
Presentation is loading. Please wait.
1
Security and Privacy in Ubiquitous Computing
2
Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security discussion Privacy and security discussion David Nguyen – guest student David Nguyen – guest student More discussion More discussion Course surveys Course surveys
3
Ubiquitous Computing (Ubicomp) Move beyond desktop machine Move beyond desktop machine Computing is embedded everywhere in the environment Computing is embedded everywhere in the environment Known by many things… Known by many things… –“off the desktop”, “out of the box”, pervasive, invisible, wearable, calm, anytime/anywhere/any place, …
4
Marc Weiser: The father of ubicomp Chief Technologist Xerox PARC Chief Technologist Xerox PARC Began Ubiquitous Computing Project in 1988 Began Ubiquitous Computing Project in 1988 1991 Scientific American article got the ball rolling 1991 Scientific American article got the ball rolling
5
Key quotes: “The most profound technologies are those that disappear” “The most profound technologies are those that disappear” “embodied virtuality" “embodied virtuality"
6
Ubicomp Notions Computing capabilities, any time, any place Computing capabilities, any time, any place “Invisible” resources “Invisible” resources Machines sense users’ presence and act accordingly Machines sense users’ presence and act accordingly
7
Ubicomp is... Related to: Related to: –mobile computing –wearable computing –augmented reality In contrast with: In contrast with: –virtual reality
8
Some scenarios – the office Smart meeting room Smart meeting room –Automatically adjusts room conditions –automatically links the devices everyone is using to each other and the display so people can easily push and pull information –Shares needed info with remote participants –Automatically creates a meeting record for everyone there, stores it properly, etc…
9
Some scenarios – the home Rooms adjust to people and activities – turn on lights, don’t bother family during dinner, etc... Rooms adjust to people and activities – turn on lights, don’t bother family during dinner, etc... Reminds or alerts people of activities (soccer game at 7), problems (heater malfunctioning), needs (out of milk) Reminds or alerts people of activities (soccer game at 7), problems (heater malfunctioning), needs (out of milk) Records family memories – first steps, Christmas… Records family memories – first steps, Christmas… Helps communicate and connect with outside family members – shared audio / video / photos / message boards, etc. Helps communicate and connect with outside family members – shared audio / video / photos / message boards, etc. Locates your keys, favorite sweater, that important document Locates your keys, favorite sweater, that important document Monitors your health and alerts to problems Monitors your health and alerts to problems
10
Some scenarios – in the world Easily find your way around and to desired places, stores and tourist sites Easily find your way around and to desired places, stores and tourist sites Get information relevant to where you are and what you are doing Get information relevant to where you are and what you are doing Access your personal information, check email, check on your house, from your mobile device no matter where you are Access your personal information, check email, check on your house, from your mobile device no matter where you are Let friends and family check on you and know what’s going on and where you are Let friends and family check on you and know what’s going on and where you are Meet and socialize with new people and old friends Meet and socialize with new people and old friends Play games in the environment Play games in the environment
11
Technology Many scenarios require knowing a subset of the following: Many scenarios require knowing a subset of the following: –who the user is –where the user is located –where various objects are located –the conditions in the environment –Infer what people are doing and want to do Using a variety of sensors, networking infrastructures, middleware, distributed software systems Using a variety of sensors, networking infrastructures, middleware, distributed software systems And a variety of input and output devices And a variety of input and output devices
12
General questions What are security implications for Ubicomp? How does this differ from what we’ve talked about so far? What are security implications for Ubicomp? How does this differ from what we’ve talked about so far? What are privacy implications and how does this differ? What are privacy implications and how does this differ? What should we be doing now to prepare for Ubicomp apps? What should we be doing now to prepare for Ubicomp apps?
13
Tradeoffs Are we better with or without lots of privacy in this new world? (benefits outweigh negatives) Are we better with or without lots of privacy in this new world? (benefits outweigh negatives) Examples: Examples: –Your car monitors how safely you drive, insurance companies adjust rates accordingly. What if the end effect is lowering accident rates? –You have several applications that help persuade you to get more exercise and be healthier, monitored by your doctor. Your insurance rates are lowered if you are successful. –Your home can easily record and organize hard-to-get moments, like your child’s first steps and first words. But your spouse can also use this to replay your exact words in that argument last night.
14
Privacy by design Notice: How invisible should protections be? Notice: How invisible should protections be? Consent: How can explicit consent be achieved? What requires it? Consent: How can explicit consent be achieved? What requires it? Anonymity: can we achieve anonymity? When should we still remain anonymous? From whom? Anonymity: can we achieve anonymity? When should we still remain anonymous? From whom? Proximity: how can this be used for security and privacy? Proximity: how can this be used for security and privacy?
15
Big Stick What is the Big Stick principle? What is the Big Stick principle? Why is this relevant to Ubicomp? Why is this relevant to Ubicomp? In what scenarios is this sufficient? In what scenarios is this sufficient? In what scenarios is this not sufficient? In what scenarios is this not sufficient?
16
Case study: RFID Radio Frequency Identification Radio Frequency Identification –Tags on objects with unique ID, readers provide power, work from some distance away Where is it being used now? Where is it being used now? What are the security issues? What are the security issues? What are the privacy issues? What are the privacy issues? What are potential solutions? What are potential solutions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.